Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Security Comes In Two Parts--Don’t Neglect The Physical Half

Security Comes In Two Parts--Don’t Neglect The Physical Half

Physical security is more or less what it sounds like: security intended to protect the physical infrastructure that houses your business and your critical data. Many of the pieces of physical security will seem very familiar, even if you didn’t know the right terms for them.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Users Features Motion Sickness Break Fix Server Management Healthcare Cyberattacks Personal Information Google Drive VoIP Fun Automobile Google Calendar Chrome Permission Tip of the Week Infrastructure Cooperation Internet Exlporer WannaCry History Downtime Staff Superfish Digital Payment Computer Star Wars Big Data Heating/Cooling SaaS Uninterrupted Power Supply Windows Retail Backup Virtualization Comparison Refrigeration Fraud Firewall How To Dark Data Phishing Best Practices IT Consultant Mobile Data Smartphones Scary Stories Websites Security Cameras Hackers Private Cloud Human Error VPN Connectivity Legislation Save Money Data Breach Motherboard Bookmarks App Business Owner Marketing Vendor Management Corporate Profile Black Friday Social Media Mail Merge iPhone Experience Legal Update Digital Signature BYOD Privacy Chatbots Law Enforcement Files Technology Tips Fleet Tracking Risk Management Screen Reader OneNote Mobile Flexibility IT Support E-Commerce Net Neutrality Typing Address Health Business Computing Unified Threat Management Cyber Monday Halloween IoT Web Server Writing Computer Repair Current Events Avoiding Downtime USB Office Tips Network Management Operations Collaboration Cleaning Quick Tips 5G Gmail Compliance Computing Infrastructure Instant Messaging Emoji Tech Support Physical Security Proactive IT Employees Saving Time Cost Management Employer-Employee Relationship Spyware PDF Outsourced IT Help Desk Encryption Undo Internet of Things ROI Office 365 Printer Multi-Factor Security Cameras Document Management Vulnerabilities Staffing Alt Codes Buisness Cache Troubleshooting Upgrades Access Control Small Business Environment CIO IT solutions Recycling Budget Monitoring Application Servers Electronic Medical Records Telephone Systems Cortana VoIP RMM HIPAA Productivity User Tips Miscellaneous Hosted Solution Mouse Analytics Business Growth Social Networking Piracy Cryptocurrency Information Technology Backups Customer Relationship Management Google Maps Presentation Apple Dark Web Laptop Network Security Upgrade User Government Business Technology Remote Computing Conferencing Redundancy Saving Money Printing Managed IT services Disaster Recovery Data loss SharePoint IT Budget Education Data storage Shortcut Workplace Tips Microsoft Excel Digital Mobile Security IP Address WiFi Botnet Data Security Software Tips Mirgation Virtual Desktop Zero-Day Threat Electronic Health Records Google Wallet Android Efficiency PowerPoint Programming Patch Management Administration Mobile Office Deep Learning Language Social Engineering Unsupported Software Crowdsourcing Computing Sports Remote Worker Managed Service Scam Innovation Touchscreen Test Managing Stress Bluetooth Entrepreneur Telephony Read Only Analyitcs Display Statistics Cables Drones Specifications Wearable Technology Data Best Practice Data Recovery Smart Technology Enterprise Content Management Data Management IT Services Ransomware Assessment Mobile Device Content Filtering Tablet Mobile Device Management File Sharing Documents Machine Learning Augmented Reality Procurement Data Warehousing Finance Windows 10 Virtual Reality Managed IT Service Disaster G Suite IT Technicians The Internet of Things Taxes Microsoft IT Support Error Distributed Denial of Service YouTube Meetings Virtual Private Network Lithium-ion Battery Consultation Network Congestion Virus Identities Geography Travel GPS IT Management Mobile Device Managment Asset Tracking Tech Term Relocation Enterprise Resource Planning Gadget Running Cable Two-factor Authentication User Error Safety Sync Backup and Disaster Recovery Disaster Resistance Unified Threat Management Cookies Remote Monitoring and Management Smartphone Supercomputer Unified Communications Spam Financial Managed Service Provider Development Apps Going Green Twitter Techology End of Support Modem Mobile Computing Applications Co-managed IT eWaste Bring Your Own Device Antivirus Bitcoin Public Speaking Firefox LiFi Humor Hacking Operating System Consulting Router Cloud Computing Technology Managed IT Services Management Facebook Work/Life Balance Alert Computers Remote Workers Software IT Consulting Public Cloud Save Time Chromebook MSP BDR Social Windows 10 CCTV Technology Laws Remote Monitoring Consumers Processors Project Management Hacker Licensing Company Culture Smart Tech Google Business Continuity Vulnerability communications Employee-Employer Relationship Software as a Service Hard Drives Administrator Notifications Wireless Hardware Tracking Robot How To Cybercrime Regulations IT service Hard Drive Malware Authorization Knowledge IBM Settings Nanotechnology Domains Tip of the week Downloads Politics Word Search Permissions Hotspot Training Computer Care Migration Alerts Cabling Passwords Wires Microsoft Office Productivity Solid State Drive Outlook Tech Terms Wireless Technology Wi-Fi Storage Office Website Money Gadgets Artificial Intelligence Blockchain Google Docs Hacks Intranet Cloud High-Speed Internet Windows 8 Monitors Password Managed Services Provider Security Information Hard Disk Drive Competition Paperless Office Networking Managed IT Automation Identity Business Management Recovery Data Backup Mobility Time Management Lenovo Mobile Devices Trending Server Utility Computing Phone System Cybersecurity Webcam Holiday 3D Printing Authentication Samsung Internet Email Hiring/Firing Theft Hosted Solutions Maintenance Customer Service Bandwidth Point of Sale WPA3 Proactive Business Communication Business Intelligence Favorites Network Browser Identity Theft Black Market

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code